Abandoned Object Detection & Illegal Dumping Detection
☆14Aug 8, 2018Updated 7 years ago
Alternatives and similar repositories for LitterBug-Algorithm
Users that are interested in LitterBug-Algorithm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hardware Accelerated Abandoned Object Detection in video feed using OpenCV (C++)☆28Aug 5, 2023Updated 2 years ago
- Abandoned object detection for visual surveillance☆71Jan 15, 2019Updated 7 years ago
- An implement of the ECCV paper Super-Identity Convolutional Neural Network for Face Hallucination.☆22Apr 26, 2019Updated 7 years ago
- ☆10Dec 20, 2017Updated 8 years ago
- Attention-Driven Loss for Anomaly Detection in Video Surveillance☆16May 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- benejson JSON parsing library☆31Nov 24, 2021Updated 4 years ago
- tensorflow serving 代码示例 , gRPC & REST clients☆14Jul 10, 2019Updated 6 years ago
- ☆13Aug 26, 2015Updated 10 years ago
- FCN-rLSTM for vehicle counting in city cameras (unofficial implementation)☆13Jul 6, 2023Updated 2 years ago
- Sphinx extension that is rendered as HTML widgets☆13Feb 7, 2023Updated 3 years ago
- App for gas monitoring with MQ135 Gas sensor, Android and Arduino☆14Jun 15, 2018Updated 7 years ago
- ☆11Feb 19, 2015Updated 11 years ago
- Abandoned Object Dataset☆33Mar 24, 2015Updated 11 years ago
- ☆10Mar 18, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Framework for asynchronous and thread-safe ESP-IDF (and FreeRTOS SMP) applications☆14Apr 27, 2023Updated 3 years ago
- RedAlertop is a small and lightweight software written in C# in order to allow us to receive Red Alert (Tzeva Adom) alerts directly to ou…☆14Sep 11, 2021Updated 4 years ago
- The deep-learning framework Caffe that support faster-rcnn and RFCN☆12Apr 24, 2018Updated 8 years ago
- a re-implementation of asoftmax in tensorflow☆90Dec 26, 2017Updated 8 years ago
- ☆11Sep 24, 2019Updated 6 years ago
- YOLT (You Only Look Twice) - a tool that attempts to improve the accuracy of YOLOv4 in images☆21May 1, 2020Updated 6 years ago
- Compose panoramas from pictures or videos☆17Dec 20, 2021Updated 4 years ago
- ☆13Dec 23, 2020Updated 5 years ago
- HDLC library for arduino☆15Nov 3, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This Repository contains development framework for using tensorflow in a neuroimaging analyses☆11Mar 7, 2017Updated 9 years ago
- ☆16Jul 13, 2016Updated 9 years ago
- Example code to help get started using TensorFlow☆21Apr 12, 2017Updated 9 years ago
- ☆12Nov 22, 2022Updated 3 years ago
- A Multilayer Backpropagation Saliency Detection Algorithm Based on Depth Mining☆12Mar 27, 2018Updated 8 years ago
- ESP32 Semihosting Profiler☆18Nov 2, 2025Updated 6 months ago
- 用于从头预训练+SFT一个小参数量的中文LLaMa2的仓库;24G单卡即可运行得到一个具备简单中文问答能力的chat-llama2.☆17Feb 29, 2024Updated 2 years ago
- JanusAdmin is a node.js http client, that implements the entire admin interface of the Janus WebRTC Gateway☆17Jul 1, 2024Updated last year
- ☆17Nov 10, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆13Dec 23, 2019Updated 6 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 5 years ago
- Implementation of Gather-Excite Network based on Mindspore and pytorch☆16Nov 21, 2022Updated 3 years ago
- Implementation of a copy move forgery detection algorithm based on the algorithm in Fridrich's paper in 2003.☆11May 29, 2017Updated 8 years ago
- Deep Steganalysis training script☆13May 1, 2025Updated last year
- ☆33Apr 20, 2018Updated 8 years ago
- Java Spring Boot MS to retrieve Israeli Pikud Ha-Oref so called Red Color alerts.☆16Jun 22, 2025Updated 10 months ago